File tree Expand file tree Collapse file tree 4 files changed +12
-10
lines changed
python/ql/src/Security/CWE-327 Expand file tree Collapse file tree 4 files changed +12
-10
lines changed Original file line number Diff line number Diff line change 2323 </recommendation >
2424 <example >
2525
26- <p >
27- The following code shows a variety of ways of setting up a
28- connection using SSL or TLS. They are all potentially insecure because the
29- default version is used.
26+ <p >
27+ The following code shows two different ways of setting up a connection
28+ using SSL or TLS. They are both potentially insecure because the
29+ default version is used.
3030 </p >
3131
3232 <sample src =" examples/insecure_default_protocol.py" />
3333
3434 <p >
35- In all of the above cases, a secure protocol should be used instead.
35+ Both of the cases above should be updated to use a secure protocol
36+ instead, for instance by specifying
37+ <code >ssl_version=PROTOCOL_TLSv1_1</code > as a keyword argument.
3638 </p >
3739 <p >
3840 Note that <code >ssl.wrap_socket</code > has been deprecated in
Original file line number Diff line number Diff line change 11/**
22 * @name Default version of SSL/TLS may be insecure
3- * @description No SSL/TLS version has been specified in a call to 'ssl.wrap_socket'.
4- * This may result in an insecure protocol being used.
3+ * @description Leaving the SSL/TLS version unspecified may result in an insecure
4+ * default protocol being used.
55 * @id py/insecure-default-protocol
66 * @kind problem
77 * @problem.severity warning
Original file line number Diff line number Diff line change 2929 <sample src =" examples/insecure_protocol.py" />
3030
3131 <p >
32- In all of the above cases, a secure protocol should be used instead.
32+ All cases should be updated to use a secure protocol, such as
33+ <code >PROTOCOL_TLSv1_1</code >.
3334 </p >
3435 <p >
3536 Note that <code >ssl.wrap_socket</code > has been deprecated in
Original file line number Diff line number Diff line change 11/**
22 * @name Use of insecure SSL/TLS version
3- * @description An insecure version of SSL/TLS has been specified. This may
4- * leave the connection open to attacks.
3+ * @description Using an insecure SSL/TLS version may leave the connection vulnerable to attacks.
54 * @id py/insecure-protocol
65 * @kind problem
76 * @problem.severity warning
You can’t perform that action at this time.
0 commit comments